Human error and security; AOL's two-factor authentication; September viruses
Increasingly, PCs must prove they're secure before a user can log onto the network
Knowing how today's hackers think and work is the first step to combating their attacks.
Big Iron was once again in vogue last week as IBM made a raft of new mainframe-related announcements
Few users seem excited about PeopleSoft falling into Oracle’s hands—except those who use Oracle’s database software
Using existing development methods, companies end up with software that doesn’t do what they need it to do. Agile software development offers a new mindset and approach to building applications that succeed.
A Service Level Management process may be what IT service organizations need to better support business demands.
Like The Dating Game and other highbrow TV fare of yesteryear, the time may be right for the development of new game shows—focused on the storage industry itself.
Creating a baseline of security for servers and clients is essential for a secure environment.
Software vaults are increasingly the solution for securing passwords, notes from the board of directors, and more
IT must cope with under-funded regulations, more CIO leeway
RealPlayer and JPEG vulnerabilities; security insurance
Partnership with IBM gives BI users a single view of data stored in DB2, VSAM, and IMS sources
Linux-powered databases post strong showings in price and performance benchmarks
The ARM standard is designed to help simplify transaction performance monitoring for Web applications
There is no single software solution that will solve all the Sarbanes-Oxley regulation requirements, but supply chain management solutions can help.
Important announcements from Hitachi Data Systems and Computer Associates may look similar from 50,000 feet, but on closer inspection they're quite different.
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
Smart cards, currently a favorite of governments and large corporations, are getting more powerful, incorporating Java and USB technologies.
Banks help ID thieves; unified security appliances; server security